Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CUPS 'scheduler/select.c' Denial Of Service Vulnerability

Information

Severity

Severity

Medium

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

4.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

12 years ago

Modified

Modified

3 years ago

Summary

This host is running CUPS (Common UNIX Printing System) Service, which is prone to Denial of Service vulnerability.

Insight

Insight

The flaw is due to an use-after-free error within the 'cupsdDoSelect()' function in 'scheduler/select.c' when kqueue or epoll is used, allows remote attackers to crash or hang the daemon via a client disconnection during listing of a large number of print jobs.

Affected Software

Affected Software

CUPS versions 1.3.x, 1.4.x on Linux.

Solution

Solution

Upgrade to version 1.5 or later, ***** NOTE: Please ignore this warning if the patch is applied. *****

Common Vulnerabilities and Exposures (CVE)